- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 108 for THIRD (0.02 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
android/guava-tests/test/com/google/common/util/concurrent/CycleDetectingLockFactoryTest.java
lock3 = factory2.newReentrantLock(MyOrder.THIRD); CycleDetectingLockFactory.WithExplicitOrdering<OtherOrder> factory3 = newInstanceWithExplicitOrdering(OtherOrder.class, Policies.THROW); lock01 = factory3.newReentrantLock(OtherOrder.FIRST); lock02 = factory3.newReentrantLock(OtherOrder.SECOND); lock03 = factory3.newReentrantLock(OtherOrder.THIRD); }
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Thu Dec 19 18:03:30 GMT 2024 - 16.2K bytes - Click Count (0) -
LICENSE
specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a discriminatory
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Apr 23 18:58:53 GMT 2021 - 33.7K bytes - Click Count (0) -
docs/en/docs/deployment/https.md
* For HTTPS, **the server** needs to **have "certificates"** generated by a **third party**. * Those certificates are actually **acquired** from the third party, not "generated". * Certificates have a **lifetime**. * They **expire**. * And then they need to be **renewed**, **acquired again** from the third party. * The encryption of the connection happens at the **TCP level**. * That's one layer **below HTTP**.
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sun Aug 31 19:34:08 GMT 2025 - 14.3K bytes - Click Count (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
That's what would happen to a third party application that tried to access one of these *path operations* with a token provided by a user, depending on how many permissions the user gave the application. ## About third party integrations { #about-third-party-integrations } In this example we are using the OAuth2 "password" flow.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sun Aug 31 10:49:48 GMT 2025 - 13.5K bytes - Click Count (0) -
helm/minio/README.md
``` Then install the chart, specifying that you want to use the TLS secret: ```bash helm install --set tls.enabled=true,tls.certSecret=tls-ssl-minio minio/minio ``` ### Installing certificates from third party CAs
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 10.9K bytes - Click Count (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
After a week, the token will be expired and the user will not be authorized and will have to sign in again to get a new token. And if the user (or a third party) tried to modify the token to change the expiration, you would be able to discover it, because the signatures would not match.
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Sep 29 02:57:38 GMT 2025 - 10.6K bytes - Click Count (0) -
apache-maven/src/main/appended-resources/licenses/EPL-2.0.txt
rights and licenses granted hereunder, each Recipient hereby assumes sole responsibility to secure any other intellectual property rights needed, if any. For example, if a third party patent license is required to allow Recipient to Distribute the Program, it is Recipient's responsibility to acquire that license before distributing the Program.
Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Tue Jun 04 06:45:16 GMT 2024 - 13.9K bytes - Click Count (0) -
LICENSES/third_party/forked/gotestsum/LICENSE
documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attributionCreated: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Fri Apr 01 18:49:15 GMT 2022 - 11.1K bytes - Click Count (0) -
guava/src/com/google/common/base/Predicates.java
* returned predicate will always evaluate to {@code true}. * * <p><b>Discouraged:</b> Prefer using {@code first.and(second).and(third).and(...)}. */ public static <T extends @Nullable Object> Predicate<T> and( Iterable<? extends Predicate<? super T>> components) { return new AndPredicate<>(defensiveCopy(components)); } /**Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Thu Aug 07 16:05:33 GMT 2025 - 26.6K bytes - Click Count (0) -
LICENSE.txt
documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attributionCreated: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Mon Jul 23 14:02:28 GMT 2012 - 11.1K bytes - Click Count (0)